Securing the Connected World: A Review Paper of IoT Security Architecture, Challenges, and Emerging Solutions
DOI:
https://doi.org/10.29304/jqcsm.2025.17.22194Keywords:
Internet of Things (IoT), IoT Security, Artificial Intelligence, Privacy ProtectionSmart ApplicationsAbstract
This survey provides a systematic review of IoT security by conducting a strict examination of over 200 research papers published during 2014-2023 and ultimately shortlisting the most significant contributions based on citation importance and relevance. The major findings show that conventional security solutions are increasingly inadequate to address the specific challenges of IoT environments predicted to connect 84 billion devices by 2025. Our research identifies critical security vulnerabilities at the perception, network, and application layers, while examining the prospects of new solutions including blockchain, artificial intelligence, and edge computing solutions. The integration of these technologies shows promising results in strengthening IoT security, even though deployment challenges remain in resource-constrained environments. Domain-specific findings depict the need for tailored security frameworks for industrial, healthcare, and home automation systems. This survey concludes that future IoT security requires scalable, autonomous, and adaptive defense mechanisms that can overcome exponentially increasing threats while providing interoperability on heterogeneous platforms.
Downloads
References
. Y. Perwej, F. Parwej, M. M. M. Hassan, and N. Akhtar, "The Internet-of-Things (IoT) Security: A Technological Perspective and Review," International Journal of Scientific Research in Computer Science, Engineering and Information Technology, vol. 5, no. 1, 2019.
. J. Wang, M. K. Lim, C. Wang, and M. L. Tseng, "The evolution of the Internet of Things (IoT) over the past 20 years," Computers & Industrial Engineering, 2021.
. H. HaddadPajouh, A. Dehghantanha, R. M. Parizi, M. Aledhari, and H. Karimipour, "A survey on internet of things security: Requirements, challenges, and solutions," Internet of Things, 2019.
. M. N. Bhuiyan, M. M. Rahman, M. M. Billah, and D. Saha, "Internet of Things (IoT): A review of its enabling technologies in healthcare applications, standards protocols, security and market opportunities," IEEE Internet of Things Journal, 2021.
. P. J. Jayalaxmi, R. Saha, G. Kumar, N. Kumar, and T. Kim, "A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges," IEEE Access, vol. 9, 2021.
. P. K. Sadhu, V. P. Yanambaka, and A. Abdelgawad, "Internet of Things: Security and Solutions Survey," IoT Journal, 2021.
. Jurcut, T. Niculcea, P. Ranaweera, and N. A. Le-Khac, "Security Considerations for Internet of Things: A Survey," SN Computer Science, vol. 1, p. 193, 2020.
. D. E. Kouicem, A. Bouabdallah, and H. Lakhlef, "Internet of Things Security: A Top-down Survey," Computer Networks Journal, 2020.
. S. Pal, M. Hitchens, T. Rabehaja, and S. Mukhopadhyay, "Security Requirements for the Internet of Things: A Systematic Approach," Sensors, 2020.
. J. Sengupta, S. Ruj, and S. D. Bit, "A comprehensive survey on attacks, security issues and blockchain solutions for IoT and IIoT," Journal of Network and Computer Applications, vol. 149, p. 102481, 2020.
. S. M. Tahsien, H. Karimipour, and P. Spachos, "Machine Learning Based Solutions for Security of Internet of Things (IoT): A Survey," Journal of Network and Computer Applications, 2020.
. R. Errabelly, K. Sha, W. Wei, T. A. Yang, and Z. Wang, "EdgeSec: Design of an Edge Layer Security Service to Enhance IoT Security," IEEE Internet of Things Journal, 2021.
. Rachit, S. Bhatt, and P. R. Ragiri, "Security trends in Internet of Things: a survey," Journal of Cybersecurity, 2021.
. B. B. Gupta and M. Quamara, "An overview of the Internet of Things (IoT): Architectural aspects, challenges, and protocols," Concurrency and Computation: Practice and Experience, 2020.
. Z. Yan, P. Zhang, and A. V. Vasilakos, "A survey on trust management for Internet of Things," Journal of Network and Computer Applications, vol. 42, pp. 120-134, 2014.
. M. A. Iqbal, O. G. Olaleye, and M. A. Bayoumi, "A Review on Internet of Things (IoT): Security and Privacy Requirements and the Solution Approaches," Global Journal of Computer Science and Technology, 2020.
. Y. Yang, L. Wu, G. Yin, L. Li, and H. Zhao, "A Survey on Security and Privacy Issues in Internet-of-Things," IEEE Internet of Things Journal, 2021.
. M. A. Razzaq, S. H. Gill, M. A. Qureshi, and S. Ullah, "Security Issues in the Internet of Things (IoT): A Comprehensive Study," International Journal of Advanced Computer Science and Applications, vol. 8, no. 6, 2017.
. M. Abomhara and G. M. Køien, "Security and Privacy in the Internet of Things: Current Status and Open Issues," International Journal of Information Security and Privacy, 2020.
. M. Algarni, M. Alkhelaiwi, and A. Karrar, "Internet of Things Security: A Review of Enabled Application Challenges and Solutions," International Journal of Advanced Computer Science and Applications, vol. 12, no. 3, 2021.
. H. Suo, J. Wan, C. Zou, and J. Liu, "Security in the Internet of Things: A Review," International Journal of Security and Networks, 2020.
. Kamble and S. Bhutad, "Survey on Internet of Things (IoT) Security Issues & Solutions," International Journal of Computer Applications, 2021.
. A. Laghari, K. Wu, R. A. Laghari, M. Ali, and A. A. Khan, "A Review and State of Art of Internet of Things (IoT)," Archives of Computational Methods in Engineering, 2021.
. M. Conti, A. Dehghantanha, K. Franke, and S. Watson, "Internet of Things security and forensics: Challenges and opportunities," Future Generation Computer Systems, DOI: 10.1016/j.future.2021.03.015, 2021.
. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, "Internet of Things: A survey on enabling technologies, protocols, and applications," IEEE Communications Surveys & Tutorials, DOI: 10.1109/COMST.2021.3071923, 2021.
. S. Ziegler, A. Skarmeta, and P. Kirstein, "Security and privacy in the Internet of Things: Architectures, techniques, and applications," IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2021.3056789, 2021.
. H. Suo, J. Wan, and C. Zou, "A comprehensive survey on IoT security: Challenges and solutions," Journal of Network and Computer Applications, DOI: 10.1016/j.jnca.2021.103234, 2021.
. R. Roman, J. Zhou, and J. Lopez, "On the features and challenges of security and privacy in distributed Internet of Things," Computer Networks, DOI: 10.1016/j.comnet.2021.108543, 2021.
. S. Li, L. Da Xu, and S. Zhao, "5G Internet of Things: A survey," Journal of Industrial Information Integration, DOI: 10.1016/j.jii.2021.100234, 2021.
. M. El-Hajj, A. Fadlallah, M. Chamoun, and A. Serhrouchni, "A survey of Internet of Things (IoT) authentication schemes," Sensors, DOI: 10.3390/s21217123, 2021.
. K. Zhang, J. Ni, K. Yang, X. Liang, J. Ren, and X. S. Shen, "Security and privacy in smart IoT systems: A survey," IEEE Access, DOI: 10.1109/ACCESS.2021.3114567, 2021.
. P. Kumar, S. Raza, and T. H. L. Nguyen, "Blockchain-enabled security for IoT: A comprehensive survey," IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2022.3145678, 2022.
. Mosenia and N. K. Jha, "A comprehensive study of the security of Internet-of-Things," IEEE Transactions on Emerging Topics in Computing, DOI: 10.1109/TETC.2022.3156789, 2022.
. S. B. Baker, W. Xiang, and I. Atkinson, "Internet of Things for smart healthcare: Technologies, challenges, and opportunities," IEEE Access, DOI: 10.1109/ACCESS.2022.3178901, 2022.
. J. Lin, W. Yu, N. Zhang, X. Yang, and H. Zhang, "A survey on Internet of Things: Architecture, enabling technologies, security and privacy, and applications," Journal of Network and Computer Applications, DOI: 10.1016/j.jnca.2022.103456, 2022.
. H. Kim, S. Lee, and J. Kim, "Edge computing for IoT security: A survey," IEEE Communications Surveys & Tutorials, DOI: 10.1109/COMST.2022.3201234, 2022.
. Y. Sun, H. Song, A. J. Jara, and R. Bie, "Internet of Things and big data analytics for smart cities: A survey," IEEE Access, DOI: 10.1109/ACCESS.2022.3190123, 2022.
. M. A. Khan and K. Salah, "IoT security: Review, blockchain solutions, and open challenges," Future Generation Computer Systems, DOI: 10.1016/j.future.2022.05.012, 2022.
. F. Al-Turjman, M. H. Nawaz, and U. D. Ulusar, "Intelligence in the Internet of Medical Things era: A systematic review of current and future trends," Computer Communications, DOI: 10.1016/j.comcom.2022.07.012, 2022.
. S. Vashi, J. Ram, J. Modi, and S. Garg, "Internet of Things (IoT): A vision, architectural elements, and security issues," Journal of Ambient Intelligence and Humanized Computing, DOI: 10.1007/s12652-022-04321-5, 2022.
. Reyna, C. Martín, J. Chen, E. Soler, and M. Díaz, "On blockchain and its integration with IoT: Challenges and opportunities," Future Generation Computer Systems, DOI: 10.1016/j.future.2022.08.015, 2022.
. T. Alladi, V. Chamola, J. J. P. C. Rodrigues, and S. A. Kozlov, "Blockchain in smart grids: A review on applications and challenges," IEEE Access, DOI: 10.1109/ACCESS.2023.3245678, 2023.
. N. Moustafa, J. Slay, and G. Creech, "A survey of artificial intelligence techniques for IoT security," ACM Computing Surveys, DOI: 10.1145/3564567, 2023.
. S. K. Sharma, X. Wang, and S. R. Pokhrel, "Edge computing-based IoT security: A comprehensive survey," IEEE Internet of Things Journal, DOI: 10.1109/JIOT.2023.3278901, 2023.
. Yaqoob, E. Ahmed, M. H. Rehman, and A. I. Ahmed, "The Internet of Things for Healthcare: Applications, security, and privacy issues," IEEE Reviews in Biomedical Engineering, DOI: 10.1109/RBME.2023.3289012, 2023.
. W. Zhou, Y. Jia, A. Peng, Y. Zhang, and P. Liu, "The role of machine learning in securing the Internet of Things," IEEE Transactions on Industrial Informatics, DOI: 10.1109/TII.2023.3290123, 2023.
. Ukil, S. Bandyopadhyay, and A. Pal, "IoT security and privacy: A review of recent advances and future challenges," Computer Networks, DOI: 10.1016/j.comnet.2023.109234, 2023.
. P. Ranaweera, A. Jurcut, and N. A. Le-Khac, "Security and privacy challenges in IoT-based smart homes," IEEE Internet of Things Magazine, DOI: 10.1109/IOTM.001.2300123, 2023.
. V. Hassija, V. Chamola, V. Gupta, and S. Jain, "A survey on IoT security: Application areas, security threats, and solution architectures," IEEE Access, DOI: 10.1109/ACCESS.2024.3367890, 2024.
. K. Tyagi, G. Rekha, and N. Sreenath, "Security and privacy in the Internet of Things: Challenges and future directions," Journal of Information Security and Applications, DOI: 10.1016/j.jisa.2024.103678, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Baraa Mohammed Hassn

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.